GSM Security Overview
#1

GSM Security Overview

[attachment=18119]


GSM Security Goals

Confidentiality and Anonymity on the radio path
Strong client authentication to protect the operator against the billing fraud
Prevention of operators from compromising of each others’ security
Inadvertently
Competition pressure

GSM Security Design Requirements

The security mechanism
MUST NOT
Add significant overhead on call set up
Increase bandwidth of the channel
Increase error rate
Add expensive complexity to the system
MUST
Cost effective scheme
Define security procedures
Generation and distribution of keys
Exchange information between operators
Confidentiality of algorithms

GSM Security Features

Key management is independent of equipment
Subscribers can change handsets without compromising security
Subscriber identity protection
not easy to identify the user of the system intercepting a user data
Detection of compromised equipment
Detection mechanism whether a mobile device was compromised or not
Subscriber authentication
The operator knows for billing purposes who is using the system
Signaling and user data protection
Signaling and data channels are protected over the radio path

GSM Mobile Station

Mobile Station
Mobile Equipment (ME)
Physical mobile device
Identifiers
IMEI – International Mobile Equipment Identity
Subscriber Identity Module (SIM)
Smart Card containing keys, identifiers and algorithms
Identifiers
Ki – Subscriber Authentication Key
IMSI – International Mobile Subscriber Identity
TMSI – Temporary Mobile Subscriber Identity
MSISDN – Mobile Station International Service Digital Network
PIN – Personal Identity Number protecting a SIM
LAI – location area identity



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: gsm technology overview, overview of credit card security system using gsm project,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,143 06-11-2014, 09:23 PM
Last Post: seminar report asees
  GSM Based Irrigation Control System seminar paper 1 2,082 24-03-2013, 08:09 PM
Last Post: Guest
  GPS & GSM Based Realtime Vehicle Tracking System. seminar paper 2 3,107 16-02-2013, 10:31 AM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,976 14-11-2012, 12:29 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,379 22-10-2012, 02:29 PM
Last Post: seminar details
  PULSE DETONATION ENGINE TECHNOLOGY: AN OVERVIEW seminar addict 1 1,867 22-10-2012, 02:24 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,719 08-10-2012, 03:08 PM
Last Post: seminar details
  Workflow Overview and DAFv2 Case Study seminar details 0 1,094 11-06-2012, 05:55 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 1,001 09-06-2012, 04:22 PM
Last Post: seminar details
  An Iris Recognition System to Enhance e-security seminar details 0 903 08-06-2012, 05:23 PM
Last Post: seminar details

Forum Jump: